完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Cho, Michael Cheng Yi | en_US |
dc.contributor.author | Hsu, Chia-Wei | en_US |
dc.contributor.author | Shieh, Shiuhpyng | en_US |
dc.contributor.author | Wang, Chi-Wei | en_US |
dc.date.accessioned | 2015-07-21T11:21:02Z | - |
dc.date.available | 2015-07-21T11:21:02Z | - |
dc.date.issued | 2014-11-01 | en_US |
dc.identifier.issn | 1520-9202 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/MITP.2014.86 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/123931 | - |
dc.description.abstract | en_US | |
dc.language.iso | en_US | en_US |
dc.subject | cloud | en_US |
dc.subject | malware | en_US |
dc.subject | computer security | en_US |
dc.subject | cloud computing | en_US |
dc.subject | security | en_US |
dc.title | Can Malware Be Exterminated by Better Understanding Its Roots? | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/MITP.2014.86 | en_US |
dc.identifier.journal | IT PROFESSIONAL | en_US |
dc.citation.volume | 16 | en_US |
dc.citation.spage | 47 | en_US |
dc.citation.epage | 53 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000345580800009 | en_US |
dc.citation.woscount | 0 | en_US |
顯示於類別: | 期刊論文 |